Ch6 - Mitigating Security Threats Flashcards
Operating System Hardening
- Disabling unnecessary services
- Removing unnecessary accounts
- Removing unnecessary components
- Uninstalling unnecessary software
- Patch System (Security hot-fix, Patch, Service Pack)
- Password Protection
Security hot-fix
A security hot-fix, also known as a critical update, is
a security update that should be applied to your system as quickly as possible because the vulnerability opens the system to serious security risks.
Patch
A patch, also known as an update, is a fix to a particular
problem in software or operating system code that is not required to be applied immediately because the security risk is not as severe as that addressed by a hot-fix.
Service pack
A service pack is all updates for a product, including
patches and security hot-fixes, from the time the product was released up to the time of the service pack. If you install a service pack, you will not need to install each patch individually, because the service pack includes all updates up to that point. You will need to install patches and security fixes that come out after the service pack.
Tools for System Hardening
- Group Policies
Group policies can be configured on the local system (the system the administrator is configuring) or can be centrally configured in the Active Directory domain, which means the settings will apply to a number of systems and users every 90 minutes, or on next user logon, or on system restart. - Security Templates
Security templates are text files that you create that have policy settings in them. The benefit of a security
template is that once you configure the template, it can then be imported into the group policies of a local system or into Active Directory. - Patch Management
- Configuring a Security Baseline
Configuring a Security Baseline
A security baseline is a standard configuration that has been approved by the company for a specific type of system or device as being secure. This standard configuration is required for all systems in order to meet the desired security requirements of the company.
Any changes to a system after the system has the security baseline implemented must follow the change management process defined by the company. It is important that if you make a change to a system that had the security baseline applied, you evaluate the system after the change to ensure that the change has not affected the security state of the system.
Security Posture
- Initial Baseline Configuration
- Continuous Security Monitoring
- Remediation
Remediation is the process of correcting a fault in the system.
Methods of Reporting
- Alarms
- Alerts
- Trends
Alarms
An alarm is used to report critical events that typically require some form of action from the system or network administrator. For example, an alarm may be used to notify an administrator of suspicious traffic on the network. In this case, the alarm is used to attract the attention of the network administrator so that they can investigate the issue.
Alerts
An alert is a less critical type of notification used to notify the system or network administrator that a specific event has occurred, but no action may be required by the administrator. Typically, an alert is used to notify the administrator of a change that has occurred, such as a system coming online or a printer being purged.
Trends
A trend is a type of reporting method used to identify security issues such as someone performing a port scan on the network. Trend analysis typically involves looking at log files or packet captures and analyzing the information to identify a trend that may help the administrator understand what is happening on the network.
For example, if the network administrator is looking at a packet capture and sees that the same source IP address is connecting to multiple ports within a very short time, then most likely a port scan is occurring.
Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC) outlines the major phases to developing an application. There are six phases to the software development life cycle:
Requirements: gathering and analysis The first phase involves collecting the requirements for the application.
Design: After the requirements are collected, you then work on designing the application based on the requirements.
Implementation (coding): The implementation phase is also known as the coding phase. During this phase, you write the code for the application.
Testing: After the coding phase, you then must test the code to verify the code does what it is supposed to.
Deployment: After testing, you are ready to install (deploy) the application to the system or systems that need to have the application.
Maintenance: During maintenance, you typically receive feedback from the persons using the application. You will need to fix any problems that arise with the application in this phase.
SDLC Models - Waterfall & Agile
Waterfall
With the waterfall model, you progress through each phase of the SDLC without the capability of going backward in phases at any time. The point is that you must be sure to complete each phase to its fullest so that there is no need to go back (that was viewed as costly when this model was created).
Agile
With the agile model, you can take a more iterative approach and go to a previous phase if you realize something was missed or needs to be reworked.
For example, you could do some requirements gathering, do some design, and then implement a prototype for the customer to review. Then, based on feedback from the customer, you may have to revisit the first few phases to complete requirements gathering and the design of the application. During testing, you may find that you need to change the design or change the code. The agile model views the capability to go back to a phase as critical to application development.
Secure DevOps
Secure DevOps is the principle of training developers to consider security from the beginning of the SDLC. Instead of viewing security as an afterthought, or something that you apply to the code after the fact, the code is
implemented with security in mind from the beginning.
Principles of Secure DevOps
- Security automation
- Continuous integration
- Baselining
- Immutable systems
- Infrastructure as code